Network Security Interview
A list of protocols used is known as –

A. Protocol access
B. Protocol stack
C. Permutation stack
D. None of the mentioned

Explanation: A list of the protocols used by a certain system, one protocol per layer, is called a protocol stack.

In order to prevent a fast sender from swamping a slow receiver with data, feedback is often used. This process is known as-

A. Flow control
B. Multiplexing
C. Congestion
D. None of the mentioned

Explanation: The process defined above is known as Flow Control.